US12265610B2 - Telemetry data - Google Patents
Telemetry data Download PDFInfo
- Publication number
- US12265610B2 US12265610B2 US17/761,637 US201917761637A US12265610B2 US 12265610 B2 US12265610 B2 US 12265610B2 US 201917761637 A US201917761637 A US 201917761637A US 12265610 B2 US12265610 B2 US 12265610B2
- Authority
- US
- United States
- Prior art keywords
- service
- telemetry data
- topic
- service request
- activities
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0639—Performance analysis of employees; Performance analysis of enterprise or organisation operations
- G06Q10/06395—Quality analysis or management
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/20—Administration of product repair or maintenance
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/50—Network service management, e.g. ensuring proper service fulfilment according to agreements
- H04L41/5061—Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the interaction between service providers and their network customers, e.g. customer relationship management
Definitions
- a ticket may be created when an issue is reported. Actions may be performed for resolving the issue. There remains a need for further improvement in this field.
- FIGS. 1 to 3 are block diagrams of systems in accordance with examples
- FIGS. 4 and 5 are flowcharts in accordance with examples
- FIG. 6 is a block diagram of an output format in accordance with an example
- FIGS. 7 to 10 are flowcharts in accordance with examples.
- FIG. 11 is a block diagram of a system in accordance with an example
- FIG. 12 is a block diagram of a neural network in accordance with an example.
- FIG. 1 is a block diagram of a system, indicated generally by the reference numeral 10 , in accordance with an example.
- System 10 comprises a first module 12 that may be configured to perform operations as described in further detail below.
- the first module 12 may receive telemetry data 11 and service ticket data 13 .
- the telemetry data 11 may comprise information relating to an activity (or activities) performed at a device.
- the telemetry data 11 may be received from the device (e.g. a printer) and may indicate the activity taking place at the device at a given time period.
- the service ticket data 13 may be related to a service request relating to the device.
- the first module 12 may use the telemetry data 11 and the service ticket data 13 for providing an output.
- the telemetry data 11 may relate to activities performed at a plurality of devices, and may be received from the respective plurality of devices.
- the service ticket data may also relate to a plurality of service requests.
- the activity performed at the device may be performed in response to an issue reported through the service request.
- an activity performed is not in response to any issue, or the an activity is not the appropriate response to any of the issues reported through service requests, there may be an indication of suspicious activity (e.g. activities performed by a malicious software, or someone performing activities that are not required to be performed or are not recommended to be performed).
- the output provided by the first module 12 may be an indication of whether the activity is suspicious or not.
- the output may comprise information regarding the likelihood that the activity was performed in response to a service request.
- the output may, for example, comprise an alert level.
- FIG. 2 is a block diagram of a system, indicated generally by the reference numeral 20 .
- System 20 is an example implementation of the first module 12 .
- the system 20 comprises a first classification module 21 and an output module 22 .
- the system 20 may receive, as inputs, service ticket data (e.g. the service ticket data 13 discussed above), which service ticket data may be received at the first classification module 21 .
- Classification of the service ticket data e.g. service topics
- the system 20 may further receive, as inputs, telemetry data classes (e.g. based on the telemetry data 11 discussed above), which telemetry data classes may be obtained at the output module 22 .
- FIG. 3 is a block diagram of a system, indicated generally by the reference numeral 30 , in accordance with an example.
- the system 30 which is an example implementation of the first module 12 , comprises the first classification module 21 and the output module 22 , as described in FIG. 2 .
- the system 30 further comprises a telemetry data classification module 31 , such that the telemetry data classes may be generated at the telemetry data classification module 31 based on input telemetry data (discussed in detail with reference to FIG. 5 ).
- the telemetry data (such as telemetry data 11 ) may be provided as inputs to the system 30 , such that the telemetry data classification module 31 may generate telemetry data classes, and the generated telemetry data classes may be provided as inputs to the output module 22 .
- the output module 22 may provide outputs based on the service topics and the telemetry data classes.
- a module such as the first module 12 , the first module 20 , the first classification module 21 , the output module 22 , and/or the telemetry data classification module 31 may be implemented in software, hardware, application logic or a combination of software, hardware and application logic.
- the telemetry data may be generated at the device (such as instrumentation of systems or subsystems) at which the activities or events occur, such that the telemetry data may relate to a variety of device components and actions.
- the telemetry data may relate to security notifications and alerts, changes in device configuration, device parameters, and/or device settings, software installations, software reinstallations, software uninstallations, firmware upgrades, firmware downgrades, physical part defects or replacement, and/or interactions (e.g. human interactions) with the devices (e.g. print jobs, scan jobs, user authentication, logins, logouts, etc.).
- the telemetry data may also comprise metadata such as time stamps, device identification (e.g. serial number, IP address or hostname) and/or username of a user performing the activity.
- FIG. 4 is a flowchart, indicated generally by the reference numeral 40 , in accordance with an example.
- FIG. 4 may be viewed in conjunction with FIGS. 1 to 3 for better understanding of the examples.
- a telemetry data class may be obtained, such that the telemetry data classes are provided as inputs to the output module 22 .
- the telemetry data class may be generated by the telemetry data classification module 31 of the system 30 .
- a plurality of telemetry data classes may be obtained or generated.
- service ticket data relating to a service request may be received, such that the service ticket data may be provided as an input to the first classification module 21 .
- a service request may be created for each issue or for a plurality of issues (e.g. related issues that may be grouped into one service request).
- the service ticket data may comprise information regarding the service requests.
- the service ticket data relating to the service request may be classified into a service topic at the first classification module 21 .
- the service topic may comprise information regarding issues identified in the service request, contextual information (e.g. the context in which the issues occurred), and/or metadata (e.g. time stamps, geographical information, environmental information, organization enrichment information, etc.).
- the classification may be performed using natural language processing.
- organizations may track issues (such as information technology (IT) issues) using ticketing systems, which systems may allow reporting, prioritization, scheduling, assigning, and tracking issues.
- the ticketing system may allow users to enter service requests, such that an administrator may be informed about the issue.
- the contents of the service request may comprise text, for example, composed by the user entering the service request. It may be possible that different users may describe the same problem differently in words.
- the service topic may be determined for the service ticket data by processing the text in the service request.
- natural language processing may be used for determining service topics that the service request may belong to.
- a first service request may comprise a text “printer cannot connect to a network”
- a second service request may comprise a text “printer cannot be used wirelessly”. Even though the first service request and the second service request are worded differently from each other, the first service request and the second service request may be related to the same issue. Therefore, the first classification module 21 may use natural language processing for classifying the first service request and the second service request into the same service topic.
- the output module 22 may determine, for each service request, an extent to which the service topic matches a telemetry data class. For example, for each service request, an individual may attempt to fix issues identified in the service request by performing an activity at the device. The activity performed may be logged as telemetry data. As described above, the telemetry data may be classified into telemetry data classes. For example, a service topic may match the telemetry data class to a high extent if the activity indicated by the telemetry data class match with an expected activity that is performed in response to the service request.
- the expected activity may comprise replacing an ink cartridge, changing settings related to the ink cartridge, checking whether the ink cartridge is fitted properly, or the like. If the telemetry data class indicates that the activity was related to settings that are unrelated to the ink cartridge (e.g. changing network settings, security settings, passwords, etc.), the extent to which the service topic matches the telemetry data class may be low.
- the activity indicated by the telemetry data classes may comprise an activity performed within a threshold time period after the service request is entered.
- the telemetry data classes may indicate an activity that was performed at a time period where there were no unresolved service requests, such that it may be determined that the extent to which any of a plurality of service topics match any of the telemetry data classes may be low.
- the output module 22 provides an output based on the determination at operation 44 .
- the output may provide an indication of the extent to which the service topic matches the telemetry data classes. For example, if an activity comprises changing security settings or passwords of a device, and there are no service topics that may require such activities to be performed, the output may provide an alert to a user that a suspicious or malicious activity may have been performed at the device. (It should be noted that such identified activities may not necessarily be malicious. For example, such changes could be accidental, or made in error.)
- the service ticket data considered at operation 42 may relate to a service request recorded within a first threshold time period before the performance of the activities of said telemetry data. For example, if an activity related to a firmware upgrade is performed within a threshold time period (e.g. one week) of a service request recorded for a firmware upgrade, the extent to which the service topic matches the telemetry data classes may be high, and it may be likely that the activity of firmware upgrade is not malicious. However, if the firmware upgrade is performed outside the first threshold time period (e.g.
- the extent to which the service topic matches the telemetry data classes may be low, and it may be likely that the activity of firmware upgrade is suspicious or malicious (or, as noted above, could be accidental or made in error).
- the service ticket data received at operation 42 comprises metadata.
- the metadata may include information indicating device identification of the device for which a service request is entered, identity of a user who entered the service request, timestamps of the service request being entered or resolved, or the like.
- the telemetry data may also comprise metadata, such that the metadata may indicate timestamps of when an activity is performed, device identification of the device where the activities are performed, user identification of a user or administrator performing the activity, or the like.
- the determination, at operation 44 , of the extent to which the service topic matches the telemetry data class may be at least partially based on the metadata.
- the metadata may provide timestamps corresponding to the service request and the telemetry data, such that it may be determined whether the activities performed at a first time period (as indicated by the metadata of the telemetry data) are expected to be performed in response to a service request during or before the first time period.
- one or more telemetry data classes may be generated or obtained for activities at one or more devices.
- the received service ticket data may relate to one or more service requests relating to at least some of said one or more devices.
- the service ticket data relating to each service request may be classified into a service topic.
- the determined extent may comprise an extent to which the service topic matches any one of the said one or more telemetry data classes.
- FIG. 5 is a flowchart, indicated generally by the reference numeral 50 , in accordance with an example.
- the first module may generate or obtain a telemetry data class relating to activities at a device.
- the output module 22 of the telemetry data classification module 31 may receive telemetry data relating to activities at the said device, or another device.
- the telemetry data may be classified (e.g. by the classification module 31 ) into a telemetry data class or a plurality of telemetry data classes.
- the activity may be logged as telemetry data, and a description of the activity may also be logged.
- the description may comprise text such as “Cleared the error by applying a firmware upgrade”.
- the telemetry data related to the service request may then be classified, for example, into a telemetry data class of “firmware upgrade”.
- FIG. 6 is a block diagram of an output format, indicated generally by the reference numeral 90 , in accordance with an example.
- the output 91 (e.g. generated at operation 45 with reference to FIG. 4 , or at output module 22 with reference to FIG. 2 or 3 ) may comprise an alert message 92 and/or an alert level 93 .
- a telemetry data class e.g. an activity
- the output may comprise an alert message 92 in order to notify an administrator that a suspicious or malicious activity may have been performed at the device.
- the output may comprise an alert level 93 .
- the alert level may be low in order to indicate that there is no likelihood or low likelihood that the activity is malicious.
- the alert level may be high in order to indicate that there is high likelihood that the activity is suspicious or malicious.
- a first score may be determined, such that the first score indicates an extent to which the telemetry data class match the service topic.
- the first score may be based on the matching of the telemetry data classes and service topics, based, at least partially, on natural language processing techniques and/or machine learning techniques.
- the alert level 93 may be based on the first score.
- the output comprises an alert message 92 , such that the alert message 92 is sent to an administrator as a notification that a malicious activity may have been performed at the device.
- the extent to which the service topic matches the telemetry data class is below a threshold, it may be determined (e.g. indicated by a score, such as a binary score) that the service topic does not match the telemetry data class, and that an activity being performed may be suspicious or malicious.
- a score such as a binary score
- the extent to which the service topic matches the telemetry data class is above a threshold, it may be determined (e.g. indicated by a score, such as a binary score) that the service topic matches the telemetry data class, and that the activity being performed is not suspicious or malicious.
- a first score may be generated in many ways.
- An example arrangement includes providing a high score where there is a mismatch between the actions and the service topic, but alternative arrangements are possible.
- Natural language processing may provide a “likelihood” in the range [0,1] representing a degree of certainty that a service ticket belongs to a given class.
- the classifier Given n classes and service ticket S, the classifier may give a number s_i, 0 ⁇ i ⁇ n, s_i in [0,1].
- N argmax(s_i) as the most likely class, and s_N as the corresponding score.
- Each class, i may also have a priority score (e.g. c_in [0,1]).
- c_i may be high (close to 1), but if i indicates a printer cartridge change then c_i may be low (close to 0), such that a password change may have a higher priority than a cartridge change.
- the priorities may be customer dependent and/or based on risk posture, etc.
- Sequences of telemetry data may be classified in a similar way.
- T may denote a sequence of telemetry items.
- T can also be assigned to one of the n classes and a score t_i, 0 ⁇ i ⁇ n may be assigned as the likelihood that the sequence T is of class i.
- the score can be a binary score (e.g. predetermined by experts).
- T may be determined to be of a certain class with absolute certainty. There may be multiple T within a window.
- a score i.e. the “first score” referred to above
- (1-s_N)*c_N*t_N This can then be compared against a threshold. If the condition that telemetry classes and service classes are equal is relaxed, then a similar process and result can be achieved by mapping the telemetry classes to the predefined service classes with differing scores. As an example, this may become a multiplier in the subsequent score.
- a score associated with each of those classes For example, messages that classify as being associated with clearing a paper jam or changing toner may be considered a low risk (e.g. low priority described above), whereas user administration or security setting changes may be considered high risk (e.g. high priority described above) and hence the score would be used to represent risk knowledge about the class.
- the scores provided may be customer specific: for example, if a customer is concerned with toner theft, this could be designated as a high risk.
- a matrix of service topics verses telemetry data class i.e. what the actions suggest is happening
- score modifiers may be encoded if there are some known actions which are often carried out whilst fixing a particular service topic, even though they might not be relevant (perhaps due to the engineer needing to find and locate a fault or trying different options).
- a score so that when a particular service topic is defined to come from a trouble ticket, then the expected (or acceptable) telemetry groups have a low score.
- the sum of the scores may be calculated for any telemetry classes from the devices within the given time.
- the higher total scores indicate more significant alerts.
- security setting changes may be downplayed (as they are expected) when network issues are reported, but not when issues are reported with user management or printer functionality (e.g. a request for more toner). In this way, a score may be modified within the context of the service topic.
- a matrix may be defined for a given service topic (i) and telemetry class j), such that a matrix element Mi,j contains the probability that when the service topic i happens, then the telemetry class j would be observed.
- For each telemetry topic j we may look across all service topics (0, . . . , n) and take the minimum value of tj*(1 ⁇ (si*mij)). Then, the scores may be added up for each of the telemetry classes. In effect, a score is calculated such that if there are several highly classified service topics, telemetry data which matches any of the high scores is classified into the service topic based, at least partially, on how well the service topic is classified.
- FIG. 7 is a flowchart, indicated generally by the reference numeral 100 , in accordance with an example.
- an output module e.g. the output module 22
- the second threshold time period is related to the maintenance time period, it may be determined that the extent to which the service topic matches the telemetry data classes may be high, and it may be likely that the activity is not malicious. For example, during a maintenance time period, various activities may be performed even if there are no specific issues specified in any service requests. As such, the activities may be related to the maintenance of the device, and may not be maliciously performed.
- FIG. 8 is a flowchart, indicated generally by the reference numeral 110 , in accordance with an example.
- operation 111 it is determined whether the activity indicated by telemetry data matches an expected activity corresponding to a service topic.
- 112 if the activity matches an expected activity, it may be determined that the extent to which the service topic matches the telemetry data classes may be high.
- an expected activity corresponding to a service topic related to ink cartridge may be an activity related to the ink cartridge.
- an ink cartridge replacement activity is performed in response to the service topic related to an ink cartridge, it may be determined that the extent to which the service topic matches the telemetry data classes may be high.
- FIG. 9 is a flowchart, indicated generally by the reference numeral 115 , in accordance to an example.
- a natural language processor may be trained, for example, based on the received service ticket data, as described with reference to FIGS. 2 to 3 .
- the service ticket data used for training the natural language processor may comprise training service ticket data.
- the service ticket data may be classified into a service topic using the trained natural language processor.
- the service ticket data may be used for training the natural language processor.
- the trained natural language processor may thereafter be used for classifying the service ticket data at operation 117 .
- the service ticket data the operation 116 of training the natural language processor may or may not be performed before performing the classification at operation 117 .
- FIG. 10 is a flowchart, indicated by the reference numeral 120 , in accordance with an example.
- training service ticket data may be received, where the training service ticket data may be related to example service requests relating to a device (or a plurality of devices).
- a natural language processor may be trained using the said training service ticket data and associated service topics.
- service ticket data relating to an operational service request may be received. The operational service request may relate to said device corresponding to the training service ticket data.
- service ticket data (e.g. new service ticket data) relating to the operational service requests may be classified into a service topic using said natural language processor.
- the natural language processor may be pre-trained (e.g.
- the natural language processor may further be trained with service ticket data relating to the operational service request (e.g. dynamic updating of training data, and dynamic training of the natural language processor).
- the training of the natural language processor is described in further detail below with reference to FIG. 11 .
- the operations 121 and 122 may be repeated a number of times before the operations 123 and 124 are executed. Moreover, a number of instances of the operations 121 and 122 may be implemented after a number of instances of the operation 123 and 124 are executed (i.e. the training of the relevant natural language processor may be updated).
- FIG. 11 is a block diagram of a system, indicated generally by the reference numeral 160 , in accordance with an example.
- the system 160 comprises a telemetry data module 174 , a service ticket module 175 and an output module 176 .
- the system 160 is an example implementation of the first module 12 and the systems 20 and 30 described above with reference to FIGS. 1 to 3 .
- the first classification module 21 may be similar to a classification module 171 comprised in the service ticket module 175
- the telemetry data classification module 31 may be similar to the classification module 173 comprised within the telemetry data module 174
- the output module 22 may be similar to the output module 176 .
- system 160 The elements of the system 160 are described in detail below. It will be apparent to those skilled in the art that a number of variants of the system 160 are possible. For example, a number of the modules may be omitted, combined or varied.
- the service ticket module 175 may comprise a service ticket system 161 , an interface 162 , a service ticket database 163 , a training set 164 , a new ticket record 165 , metadata 166 , tokenizing module 167 , training module 168 , natural language processing model 169 , service ticket classes 170 , and classification module 171 .
- the service ticket system 161 is used for receiving service requests (e.g. implementing operation 42 with reference to FIG. 4 ) related to a device from a user, such that service ticket data may be analysed.
- the service ticket system 161 may comprise a third party ticketing system, and the service ticket data may be received at the database 163 using an application programming interface, such as the interface 162 .
- the service ticket data may be recorded in the new ticket record 165 , and may also be used as a part of a training set 164 for training a natural language processing model, such as a machine learning model (e.g. implementing operation 116 and/or 122 with reference to FIGS. 9 and/or 10 respectively).
- a natural language processing model such as a machine learning model (e.g. implementing operation 116 and/or 122 with reference to FIGS. 9 and/or 10 respectively).
- the service ticket data may be used as training data.
- the tokenizing module 167 may parse the service ticket data, and may assist in tagging part(s) of the service requests.
- the tagging may comprise speech tagging (e.g. to find nouns, etc.), and name entity recognition that may identify certain types of words, such as locations.
- the training module 168 may use the service ticket data and/or the parsed service ticket data for training the machine learning model (e.g. the NLP model 169 ).
- the training module 168 may extract topics for the service requests based on natural language processing techniques.
- the topics may be related to the type of service request, the location of the devices related to the service request, the type of activities required to resolve issues specified in the service request, or the like.
- the service ticket data may then be classified (e.g. implementing operation 43 , 117 , and/or 124 , with reference to FIGS. 4 , 9 , and/or 10 respectively) into classes 170 , where the classes 170 may comprise service topics.
- the classification indicated by the classes 170 may be used at the NLP model 169 for classifying service ticket data related to new ticket records 165 .
- new service ticket data related to the new service requests may be recorded at the new ticket record 165 .
- the tokenizing module 167 may parse the new service ticket data and may assist in tagging part(s) of the new service requests (e.g. speech tagging and/or name entity recognition).
- the new ticket record may also record metadata 166 from the new service requests.
- the NLP model 169 may be used for determining topics related to the new service ticket data, for example, based on natural language processing techniques.
- the classification module 171 may be used for classifying the service requests into a service topic (e.g. implementing operation 43 , 117 , or 124 , with reference to FIGS. 4 , 9 , and 10 respectively).
- the telemetry data module 174 may comprise an event stream 172 and a classification module 173 .
- the event stream 172 may be generated as a continuous time series that may comprise information regarding activities performed at a device.
- the telemetry data (similar to telemetry data 11 described above with reference to FIG. 1 ) may be logged via protocols such as syslog and other event types.
- Such telemetry data related to activities or events may be designed to be provided to event management engines for further processing and analysis.
- the classification module 173 may aggregate, analyze, and classify the telemetry data received in the event stream (e.g. implementing operation 52 described above with reference to FIG. 5 ).
- a single activity may correspond to a plurality of data points in the telemetry data, and the plurality of data points may be aggregated to identify the single activity corresponding to the plurality of data points.
- a firmware upgrade may comprise various operations such as logging in, uploading a firmware file, entering 1 o authentication codes, entering preferences, agreeing to terms and conditions, confirming the upgrade, and the like. These operations may be aggregated and classified into a telemetry data class named “firmware upgrade”.
- the telemetry data classes received from the telemetry data module 174 may be compared against service topics received from the service ticket module 175 .
- the comparison may be based on the nature of the activities indicated by the telemetry data classes, the nature of the service topics, and/or the metadata related to the telemetry data and/or service tickets.
- the activities from the event stream may be compared with the service topics in order to determine whether the activities (e.g. administrative actions) were aligned with service requests (e.g. trouble tickets).
- the metadata (such as timestamps) related to the telemetry data and service requests may be used to determine whether activities occurred within threshold time periods of service requests being entered.
- Metadata (such as device identification) related to the telemetry data and service requests may be used to determine whether the activities performed and the service requests relate to the same device or different devices, or whether the activities performed at a device correlates with service requests related to devices in the same office or different offices.
- Metadata comprising login data may also be used to identify the administrator of the device at which activities are performed, and may be compared to the metadata in the service request indicating whether the same administrator is working to resolve the issue specified in the service request.
- the telemetry data and the service ticket data may be compared in order to identify correlations or inconsistencies in activities performed at the device.
- the output module 176 may provide an output based on an extent to which service topics match telemetry data classes (e.g.
- the output may comprise an alert level or alert message indicating a high risk associated with the activity.
- the alert level or message may be provided to an administrator, such that the activities may be investigated.
- the output e.g. alert message or alert level
- the output may indicate that such activities may be suspicious or malicious, and that the activities should be investigated.
- the telemetry data classes and/or service topics determined by the classification modules 173 and 171 respectively may be updated manually by an administrator. For example, when activities are investigated by an administrator, the administrator may investigate whether the classification of the telemetry data into telemetry data classes or the classification of the service ticket data to service topics are inaccurate. Such inaccurate classification may create false alarms, and may be corrected by the administrator. Such inaccuracies may also be logged as examples, and may be used for further training the NLP model to provide better classifications. The administrator may also create new telemetry data classes or service topics, and classify activities or service ticket data accordingly. This provides an extended database for refining and retraining the NLP or telemetry data or service topic classification.
- the classification module 171 may be updated by further training and/or updating the NLP model 169
- the classification module 173 may be updated by training and/or updating a model (e.g. a machine learning model) used for classifying telemetry data into telemetry data classes).
- a model e.g. a machine learning model
- the natural language processor may comprise a machine learning model.
- FIG. 12 shows a neural network, indicated generally by the reference numeral 200 , used in some examples.
- the natural language processor may comprise a machine learning model, such as the neural network 200 .
- the neural network 200 may be trained with inputs, including service ticket data (e.g. relating to example service requests and/or operational service requests).
- the neural network 200 comprises an input layer 201 , a hidden layer 202 (or a plurality of hidden layers 202 ), and an output layer 203 .
- service ticket data related to a plurality of service requests may be received as inputs, along with associated service topics that the service ticket data may be classified into.
- the hidden layers 202 may comprise a plurality of hidden nodes, where the processing may be performed based on the data received.
- classification of the service ticket data into service topics may be determined.
- service topics may be generated and matched with the appropriate corresponding classes of telemetry data, for example for a given printer within the time window of a service ticket.
- a set of associated events may therefore be collected together (e.g. service ticket, telemetry events, telemetry classes, service topics, matching score) which can then be stored as an audit record (which may be referred to as an “evidential unit”).
- the storing of such an audit record may allow the performance of a retrospective analysis on the data to associate the events linked to a trouble ticket and how they were interpreted.
- the examples described may be implemented in software, hardware, application logic or a combination of software, hardware and application logic.
- the software, application logic and/or hardware may reside on memory, or any computer media.
- the application logic, software or an instruction set is maintained on any one of various computer-readable media.
- a “memory” or “computer-readable medium” may be any non-transitory media or means that can contain, store, communicate, propagate or transport the instructions for use by or in connection with an instruction execution system, apparatus, or device, such as a computer.
- the different functions discussed herein may be performed in a different order and/or concurrently with each other. Furthermore, if desired, at least some of the above-described functions may be optional or may be combined.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Tourism & Hospitality (AREA)
- Quality & Reliability (AREA)
- Development Economics (AREA)
- Educational Administration (AREA)
- Operations Research (AREA)
- Marketing (AREA)
- Game Theory and Decision Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims (14)
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/US2019/057199 WO2021080554A1 (en) | 2019-10-21 | 2019-10-21 | Telemetry data |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| US20220382858A1 US20220382858A1 (en) | 2022-12-01 |
| US12265610B2 true US12265610B2 (en) | 2025-04-01 |
Family
ID=75620250
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US17/761,637 Active 2040-09-07 US12265610B2 (en) | 2019-10-21 | 2019-10-21 | Telemetry data |
Country Status (4)
| Country | Link |
|---|---|
| US (1) | US12265610B2 (en) |
| EP (1) | EP4049157A4 (en) |
| CN (1) | CN114586029B (en) |
| WO (1) | WO2021080554A1 (en) |
Families Citing this family (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US12057959B2 (en) * | 2019-12-31 | 2024-08-06 | Mcafee, Llc | Device identification |
| JP7242585B2 (en) * | 2020-01-31 | 2023-03-20 | 株式会社日立製作所 | Recommendation system and recommendation method |
| US11727331B2 (en) * | 2021-01-04 | 2023-08-15 | Fidelity Information Services, Llc | Systems and methods for intelligent ticket management and resolution |
| WO2024158969A1 (en) * | 2023-01-27 | 2024-08-02 | Logrocket, Inc. | Techniques for automatically triaging and describing issues detected during use of a software application |
Citations (19)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20020087290A1 (en) | 2000-03-09 | 2002-07-04 | Wegerich Stephan W. | System for extraction of representative data for training of adaptive process monitoring equipment |
| US20110004419A1 (en) | 2009-07-01 | 2011-01-06 | Kohji Ue | Apparatus, system, and method of determining apparatus state |
| US20120304007A1 (en) | 2011-05-23 | 2012-11-29 | Hanks Carl J | Methods and systems for use in identifying abnormal behavior in a control system |
| US20130262082A1 (en) | 2012-03-28 | 2013-10-03 | Xerox Corporation | Natural language incident resolution |
| US20140006861A1 (en) | 2012-06-28 | 2014-01-02 | Microsoft Corporation | Problem inference from support tickets |
| US20160204992A1 (en) | 2015-01-09 | 2016-07-14 | Microsoft Technology Licensing, Llc | Dynamic telemetry message profiling and adjustment |
| WO2016168733A1 (en) | 2015-04-17 | 2016-10-20 | Symantec Corporation | Quantitative security improvement system based on crowdsourcing |
| US9654485B1 (en) | 2015-04-13 | 2017-05-16 | Fireeye, Inc. | Analytics-based security monitoring system and method |
| US9672497B1 (en) | 2013-11-04 | 2017-06-06 | Snap-On Incorporated | Methods and systems for using natural language processing and machine-learning to produce vehicle-service content |
| US20170161335A1 (en) * | 2015-12-03 | 2017-06-08 | International Business Machines Corporation | Analyzing Tickets Using Discourse Cues in Communication Logs |
| US20170346795A1 (en) * | 2016-05-26 | 2017-11-30 | Pepsico, Inc. | Secure Gateways for Connected Dispensing Machines |
| US20180239752A1 (en) | 2016-04-18 | 2018-08-23 | Microsoft Technology Licensing, Llc | Correlating distinct events using linguistic analysis |
| US20180247218A1 (en) * | 2017-02-24 | 2018-08-30 | Accenture Global Solutions Limited | Machine learning for preventive assurance and recovery action optimization |
| US20180308069A1 (en) | 2017-04-19 | 2018-10-25 | Garrick Edward STARKS | Apparatus, method, and product of manufacture for robot servicing |
| US20190004890A1 (en) | 2017-06-30 | 2019-01-03 | Wipro Limited | Method and system for handling one or more issues in a computing environment |
| US20190281172A1 (en) | 2018-03-12 | 2019-09-12 | Ricoh Company, Ltd. | Maintenance system, maintenance server, and maintenance method |
| US20200050896A1 (en) * | 2018-08-09 | 2020-02-13 | Servicenow, Inc. | Machine Learning Classification with Model Quality Prediction |
| US10855561B2 (en) * | 2016-04-14 | 2020-12-01 | Oracle International Corporation | Predictive service request system and methods |
| US11223540B1 (en) * | 2017-10-12 | 2022-01-11 | United Services Automobile Association (Usaa) | Predictive routing for service sessions |
Family Cites Families (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10089323B2 (en) * | 2012-04-05 | 2018-10-02 | Microsoft Technology Licensing, Llc | Telemetry system for a cloud synchronization system |
| US20180335900A1 (en) * | 2017-05-22 | 2018-11-22 | Microsoft Technology Licensing, Llc | Dynamic support feedback for in-app help |
| US10795987B2 (en) * | 2017-09-29 | 2020-10-06 | ZenDesk, Inc. | Rate-limiting API calls for an account in a customer-relationship-management system based on predicted abusive behavior |
| US10834227B2 (en) * | 2018-02-13 | 2020-11-10 | International Business Machines Corporation | Conversational agent learning model service selection to address a client service request |
-
2019
- 2019-10-21 US US17/761,637 patent/US12265610B2/en active Active
- 2019-10-21 EP EP19949790.0A patent/EP4049157A4/en active Pending
- 2019-10-21 WO PCT/US2019/057199 patent/WO2021080554A1/en not_active Ceased
- 2019-10-21 CN CN201980101550.3A patent/CN114586029B/en active Active
Patent Citations (19)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20020087290A1 (en) | 2000-03-09 | 2002-07-04 | Wegerich Stephan W. | System for extraction of representative data for training of adaptive process monitoring equipment |
| US20110004419A1 (en) | 2009-07-01 | 2011-01-06 | Kohji Ue | Apparatus, system, and method of determining apparatus state |
| US20120304007A1 (en) | 2011-05-23 | 2012-11-29 | Hanks Carl J | Methods and systems for use in identifying abnormal behavior in a control system |
| US20130262082A1 (en) | 2012-03-28 | 2013-10-03 | Xerox Corporation | Natural language incident resolution |
| US20140006861A1 (en) | 2012-06-28 | 2014-01-02 | Microsoft Corporation | Problem inference from support tickets |
| US9672497B1 (en) | 2013-11-04 | 2017-06-06 | Snap-On Incorporated | Methods and systems for using natural language processing and machine-learning to produce vehicle-service content |
| US20160204992A1 (en) | 2015-01-09 | 2016-07-14 | Microsoft Technology Licensing, Llc | Dynamic telemetry message profiling and adjustment |
| US9654485B1 (en) | 2015-04-13 | 2017-05-16 | Fireeye, Inc. | Analytics-based security monitoring system and method |
| WO2016168733A1 (en) | 2015-04-17 | 2016-10-20 | Symantec Corporation | Quantitative security improvement system based on crowdsourcing |
| US20170161335A1 (en) * | 2015-12-03 | 2017-06-08 | International Business Machines Corporation | Analyzing Tickets Using Discourse Cues in Communication Logs |
| US10855561B2 (en) * | 2016-04-14 | 2020-12-01 | Oracle International Corporation | Predictive service request system and methods |
| US20180239752A1 (en) | 2016-04-18 | 2018-08-23 | Microsoft Technology Licensing, Llc | Correlating distinct events using linguistic analysis |
| US20170346795A1 (en) * | 2016-05-26 | 2017-11-30 | Pepsico, Inc. | Secure Gateways for Connected Dispensing Machines |
| US20180247218A1 (en) * | 2017-02-24 | 2018-08-30 | Accenture Global Solutions Limited | Machine learning for preventive assurance and recovery action optimization |
| US20180308069A1 (en) | 2017-04-19 | 2018-10-25 | Garrick Edward STARKS | Apparatus, method, and product of manufacture for robot servicing |
| US20190004890A1 (en) | 2017-06-30 | 2019-01-03 | Wipro Limited | Method and system for handling one or more issues in a computing environment |
| US11223540B1 (en) * | 2017-10-12 | 2022-01-11 | United Services Automobile Association (Usaa) | Predictive routing for service sessions |
| US20190281172A1 (en) | 2018-03-12 | 2019-09-12 | Ricoh Company, Ltd. | Maintenance system, maintenance server, and maintenance method |
| US20200050896A1 (en) * | 2018-08-09 | 2020-02-13 | Servicenow, Inc. | Machine Learning Classification with Model Quality Prediction |
Also Published As
| Publication number | Publication date |
|---|---|
| CN114586029B (en) | 2025-06-24 |
| EP4049157A4 (en) | 2023-07-12 |
| CN114586029A (en) | 2022-06-03 |
| US20220382858A1 (en) | 2022-12-01 |
| EP4049157A1 (en) | 2022-08-31 |
| WO2021080554A1 (en) | 2021-04-29 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12265610B2 (en) | Telemetry data | |
| US11295034B2 (en) | System and methods for privacy management | |
| US11157629B2 (en) | Identity risk and cyber access risk engine | |
| US10264009B2 (en) | Automated machine learning scheme for software exploit prediction | |
| US10721256B2 (en) | Anomaly detection based on events composed through unsupervised clustering of log messages | |
| US10938845B2 (en) | Detection of user behavior deviation from defined user groups | |
| US20200160230A1 (en) | Tool-specific alerting rules based on abnormal and normal patterns obtained from history logs | |
| US7552472B2 (en) | Developing and assuring policy documents through a process of refinement and classification | |
| US8966569B2 (en) | Collaborative structured analysis system and method | |
| US20180248902A1 (en) | Malicious activity detection on a computer network and network metadata normalisation | |
| US11290325B1 (en) | System and method for change reconciliation in information technology systems | |
| US20050102534A1 (en) | System and method for auditing the security of an enterprise | |
| WO2017037443A1 (en) | Predictive human behavioral analysis of psychometric features on a computer network | |
| US11663329B2 (en) | Similarity analysis for automated disposition of security alerts | |
| KR102716692B1 (en) | Digital cloud-based platform and method for providing shell communication with cognitive cross-collaborative access using guaranteed attribute parameters and operational conditioning tags | |
| JP2013050969A (en) | It risk management system and it risk management method using the system | |
| JP7033560B2 (en) | Analytical equipment and analytical method | |
| Kalaki et al. | Anomaly detection on OpenStack logs based on an improved robust principal component analysis model and its projection onto column space | |
| US8893289B1 (en) | Internal privacy invasion detection and prevention system | |
| US12524812B2 (en) | Method for characterizing asset groups spanning multiple asset classes in a computer network | |
| Janith et al. | SentinelPlus: a cost-effective cyber security solution for healthcare organizations | |
| GB2627553A (en) | System for processing network security alerts | |
| Rios | Maintaining zero trust with elk | |
| Wendt | AI for Defense | |
| Garchery | User-centered intrusion detection using heterogeneous data |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CHANG, NELSON LIANG AN;REEL/FRAME:059301/0963 Effective date: 20191016 Owner name: HP INC UK LIMITED, UNITED KINGDOM Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ELLAM, DANIEL CAMERON;BALDWIN, ADRIAN JOHN;REEL/FRAME:059301/0910 Effective date: 20191017 |
|
| FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
| AS | Assignment |
Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HP INC UK LIMITED;REEL/FRAME:059503/0020 Effective date: 20220403 |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: AWAITING TC RESP, ISSUE FEE PAYMENT VERIFIED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: AWAITING TC RESP, ISSUE FEE PAYMENT VERIFIED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |